It appears that your browser does not support JavaScript, or you have it disabled. This site is best viewed with JavaScript enabled. If JavaScript is disabled in your browser, please turn it back on then reload this page. If your browser does not support JavaScript, click here for a page that doesn't require javascript.

In this purely demo-based session, I will show several real-life attacks, from mere reading up to disrupting service availability via various types of manual and automated SQL Injection, including a broadly unknown elevation of privileges attack.

This session goes beyond the classical star schema modeling, exploring new techniques to model data with Power Pivot and SSAS Tabular. You will see how brute-force power in DAX allows different data models than those used in SSAS Multidimensional

In this talk, I will share my experience in creating and running Azure SQL Database, a large cloud scale service powered by SQL Server technologies. This presentation will provide an outline of the scenarios and requirements for a database service.

Everyone wants a job they enjoy and look forward to working at each day. This session will present practical techniques for improving your brand and giving you the chance to interview for the job you want.

Information Workers and Data Analysts do “myth busting" on corporate performance and forecasts on regular basis. This session uncovers ways to take advantage of Power BI as Software as a Service (SaaS) for a "myth busting" lab you can try at home!

Sets are king when it comes to SQL Server, but sometimes you need to see data row by row. Window
Functions help you get the best of both worlds. Learn when and where these functions can help you get what you need without compromising performance.

Continuous delivery is an approach that enables new functionality to be delivered as needed. This session will cover how this approach can be applied to data warehouses to enable faster time to value for the consumers of the data.

Everyone knew how to keep data safe and secure, right up until Edward Snowden revealed this error. Learn how to keep the data secure, by identifying and quantifying the risks. Take away practical tips and advice to apply immediately.

This session targets SSAS developers that are already dealing with complex security solutions on a regular basis and want to get more insights on what actually happens inside SSAS when the different kinds of security are applied to their model.

This 500 level session will focus on using undocumented statements and trace flags to get insight into how the query optimizer works and show you which operations it performs during query optimization.

Join me for an hour of playing with different ETL patterns by using Clustered Columnstore Indexes. Using different Hardware might lead you to different conclusions,and the size of the workload is always the paramount of your performance.Loading data first and then creating a Clustered Columnstore or creating Clustered Columnstore and than loading - join me to find the answers!

About

SQL Bits was started by a group of individuals that are passionate about the SQL Server product suite.
There is a breadth of knowledge in the SQL Community that will benefit everyone in the community.
We want to spread that knowledge.

We all work with the SQL community, some of us for many years. We have a range of skills and experiences from being given the MVP award by Microsoft, organising user groups and speaking at events around the world.